try those actual occupy a inspect at questions for A2010-502 examination.
killexams.com questions and solutions helped me to know what exactly is expected within the examination A2010-502. I organized well inside 10 days of education and completed plenary of the questions of exam in 80 minutes. It incorporate the subjects much enjoy exam point of view and makes you memorize plenary of the topics easily and correctly. It likewise helped me to realize the way to control the time to complete the examination before time. its miles considerable method.

Save your time and money, occupy these A2010-502 and prepare the exam.
That is an virtually valid and dependable advantageous aid, with actual A2010-502 questions and accurate solutions. The testingengine works very clean. With greater statistics and exact customer support, this is a completely unique provide. No loose random braindumps available on-line can compare with the notable and the best undergo I had with Killexams. I exceeded with a in truth unreasonable rating, so Im telling this based on my private experience.

Try out these actual A2010-502 actual test questions.
preparing for A2010-502 books may subsist a difficult process and 9 out of ten probabilities are that youll fail in case you execute it with zero confiscate guidance. Thats where attribute A2010-502 e reserve comes in! It affords you with green and groovy data that no longer only complements your guidance however additionally offers you a clean cleave hazard of passing your A2010-502 download and stepping into any university with zero melancholy. I organized through this brilliant software and that iscored 42 marks out of 50. i will assure you that its going to by no means assist you to down!

wherein am i able to find A2010-502 trendy and up to date dumps questions?
A few specific guys cant deliver an alteration to the worlds way however they might only assist you to understand whether or notyouve were given been the best man who knew the way to execute that and i want to subsist recounted in this global and gain my non-public imprint and i hold been so lame my entire manner but I understand now that I preferred to snare a bypassin my A2010-502 and this can gain me well-known possibly and sure i am brief of glory however passing my A+ assessments with killexams.Com changed into my morning and night time time glory.

these A2010-502 actual occupy a inspect at questions works in the actual occupy a inspect at.
After trying numerous books, i was quite upset not getting the perquisite materials. i was seeking out a tenet for examination A2010-502 with simple language and properly-organized content material. killexams.com fulfilled my need, because it defined the intricate topics within the handiest way. inside the actual examination I were given 89%, which changed into beyond my expectation. thank you killexams.com, in your incredible manual-line!

it's miles genuinely awesome help to hold A2010-502 latest dumps.
I even hold earned better scores in A2010-502 certification with the assist of enormously affordable merchandise. I were given A2010-502 exam engine to execute away with tough ideas of this certification. I had offered A2010-502 exam braindump to hold shiny grades within the certification. It was perquisite decision due to the fact these merchandise are designed according to my mindset. It helped me to snare study in fifteen days and after this short time I had scored accurate with the assist of these sensible products consequently I am writing to Tell thanks to plenary of you for your wonderful services.

I feel very confident via getting prepared A2010-502 actual exam questions.
I would really recommend killexams.com to everyone who is giving A2010-502 exam as this not just helps to flick up the concepts in the workbook but likewise gives a considerable persuasion about the pattern of questions. considerable help ..for the A2010-502 exam. Thanks a lot killexams.com team !

proper locality to discover A2010-502 dumps paper.
That is the attribute examination readiness i hold ever lengthy beyond over. I surpassed this A2010-502 colleague exam pains unfastened. No shove, no tension, and no sadness amid the examination. I knew plenary that I required to recognize from this killexams.Com %. The inquiries are sizeable, and that i got notification from my associate that their coins once more surety lives up to expectancies.

real test questions modern day A2010-502 exam! source.
Im thankful to killexams.Com for his or her mock occupy a inspect at on A2010-502. I should skip the examination with out issue. Thank you over again. I hold moreover taken mock occupy a inspect at from you for my other assessments. Im finding it very advantageous and am confident of clearing this exam through attaining more than eighty five%. Your query monetary institution can subsist very advantageous and explainations are likewise incredible. Im capable of give you a four notable rating.

Try out these actual A2010-502 questions.
The killexams.Com fabric as well as A2010-502 Exam Simulator is going properly for the exam. I used both them and succeed within the A2010-502 exam without any trouble. The fabric helped me to research where I turned into weak, so that I progressed my spirit and spent enough time with the unique topic. In this manner, it helped me to establish together nicely for the examination. I want you accurate success for you all.

IBM Assess: IBM Tivoli Endpoint

As cellular protection Challenges Mount, How Can CIOs and CISOs dispose of Blind Spots?
November 13, 2018 | through John Harrington Jr.

Thinkstock

Share As mobile protection Challenges Mount, How Can CIOs and CISOs liquidate Blind Spots? on Twitter Share As cellular protection Challenges Mount, How Can CIOs and CISOs dispose of Blind Spots? on facebook Share As mobile security Challenges Mount, How Can CIOs and CISOs snare rid of Blind Spots? on LinkedIn

If we’ve learned anything this 12 months, it’s that cellular malware, malvertising and phishing assaults are starting to be. groups of plenary sizes and industries are in danger, and IT and protection leaders liable for managing endpoints and mobile safety are well sensible that their companies’ statistics, consumer privacy and brand reputation — just to identify a few — are in the crosshairs of threat actors who stand to profit more than they must lose.

security gurus are desperately trying to find tactful tactics to are searching for out and atomize cellular malware because it becomes greater superior and different, and as incidents develop into more regular. With phishing, man-in-the-core (MITM) and statistics exfiltration attacks on the upward thrust, it’s not ever been greater crucial to cowl plenary their bases and educate conclusion clients. And let’s not overlook that threats approach from plenary directions, not just the outdoor. really, personnel are the weakest link; laborers are infamous for consuming huge amounts of records and inadvertently subjecting their organizations to criminal and regulatory compliance violations.

Register for the Dec. 4 webinar

a short record to dawn Your cellular safety method

With so many distinctive challenges to deal with, where can chief information protection officers (CISOs) and chief guidance officers (CIOs) even start to prioritize? At a minimal, these stakeholders should reply here questions as quickly as viable:

With cellular instruments becoming in number and range, how can they achieve enough insurance policy at a granular level?

How execute they implement compliance for outfit clients devoid of disrupting their stage of productivity and interoperability with internal and exterior stakeholders?

As personnel require anytime-anyplace accessibility from the contraptions of their deciding upon, how execute they subsist sure that the appropriate, licensed clients are becoming the accurate entry they're entitled to?

In crafting applicable responses and action plans to address these questions, it’s abundantly limpid that coincident commercial enterprise security challenges require a deeper stage of visibility, coverage and insurance plan. happily, there are modernized techniques obtainable to simplify and streamline this system.

An most excellent unified endpoint management platform can subsist wealthy with synthetic intelligence (AI) insights, actionable advice and contextual analytics that enable administrators to find dangers and alternatives regarding their environment — and present confiscate information to prioritize and overcome challenges in as few steps as viable.

to maximise the protection of your endpoint and mobile ambiance, your UEM solution should gain it convenient to configure and implement guidelines at a granular degree. directors should still subsist in a position to detect when an unapproved application is installed on a device, when consumer habits appears suspicious or when a risky URL is clicked. furthermore, it should subsist standard to automate the type of response that happens when that class of incident occurs.

Add useful danger and information administration

beyond assurance that your devices, clients, functions, content material and records are comfy, groups necessity to gain sure that they could identify and reply to threats before they gain an impact. lots of the phishing and malware attacks they examine within the information hold already befell. To in the reduction of the variety of these incidents, groups should subsist able to admire and respond to threats in the moment. in case you would not hold an confiscate framework to check which of your contraptions hold malware on them — or no matter if there’s a cybercriminal concentrated on your essential property — the time is now to snare the applicable manner and tools in location.

last, however no less important, is facts. data has proven to subsist a double-edged sword for IT and security groups: Its accessibility is basic for enterprise productiveness, yet if accessibility is too huge, fees proceed up. If it’s underregulated, vulnerabilities boost. accordingly, applicable suggestions and investments ensure that:

facts consumption is measured and controlled;

Conditional entry to functions, content material and supplies is enforced; and

searching deportment is monitored and maintained.

A Partnership for complete cell danger Prevention

To assist organizations mount above these very exact protection challenges, Wandera and IBM MaaS360 with Watson joined forces to bring better visibility, policy and protection.

in line with Roy Tuvey, co-founder and president of Wandera, this partnership “makes it feasible for IT leaders to with no pains hold in reason and exploit cell chance. The joint acknowledge supplies extraordinary visibility on the endpoint and in the mobile community, allowing for a deeper evaluation of cellular threats and excellent-tuned policy movements to preserve in opposition t them. they are excited to subsist participating with IBM MaaS360 with Watson to dispose of cell blind spots and equip consumers with the tools they should totally embrace mobility as a traffic enabler.”

join experts from IBM and Wandera for an upcoming live webinar at 1 p.m. EST on Dec. 4 to study extra about this spellbinding collaboration and behold a live demonstration of latest platform integrations and capabilities.

IBM has brought a utility system for assisting a number of virtual laptop solutions on a collection of IBM-distinctive reference infrastructures, allowing you to occupy your work computing device anywhere.

called the IBM SmartCloud desktop Infrastructure, the options utilize a variety of desktop virtualization technologies that enable corporations to centrally manage computers while permitting employees with access to purposes from basically any device.

IBM outfit x vice president Roland Hagan said in a video accompanying the announcement that the SmartCloud initiative turned into designed to “help organizations manage the transition to an ‘anyplace, every time’ workplace cost effectively, while minimizing possibility.”

He mentioned shoppers hold given IBM three factors for imposing computer virtualization: the bring Your personal outfit to work flow; that organizations are looking to aid however hold IT considerations; increased considerations with protection and compliance because of the various areas employees work backyard the workplace; and the complexity of supporting so many different devices, together with smartphones and tablets.

That’s the point of this digital computing device: to avert the physical constraints of computing by using letting users hasten a computing device, laptop, computing device or Mac, pill or smartphone. it is designed to aid systems across numerous industries, together with healthcare, training, fiscal features and retail, as well as the public sector, native, state and federal executive groups.

SmartCloud computer Infrastructure gives a group of IBM-distinct reference infrastructures with a decision of a number of virtual laptop solutions, together with Citrix and VMware in addition to an IBM acknowledge offered with Verde’s virtual Bridges, working on IBM system x servers.

SmartCloud computing device likewise offers IBM’s Tivoli Endpoint manager for management of the different instruments and IBM safety entry manager for single signal-on throughout the business. The typical infrastructure is in response to IBM’s device x servers.

this benevolent of system is required because we’re now not in a one-computing device-mannequin-matches-all world from now on, mentioned Charles King, primary analyst with Punt-IT. “earlier than the total BYOD aspect, the fundamental motive corporations insisted on the very benevolent of desktop or smartphone became to create an easier administration schema for his or her IT guys. That’s conveniently now not going to subsist operating process for the titanic majority of organizations from here on out,” he mentioned.

“So what IBM is doing is helping IT managers and group of workers subsist bendy adequate that they could supply plenary flexibility and safety, whatever contraptions americans convey into the dwelling of work,” he delivered.

it is feasible to construct your own infrastructure akin to what IBM is offering, but IBM offers a turnkey solution, which means you'll hold to spend much less time and funds in case you just proceed along with pre-configured systems enjoy this”. introduced King.

IBM is launching a mobile outfit administration suite, integrating its BigFix acquisition to provide management of protection guidelines throughout iPhone and Android devices.

In standard, they nevertheless behold many corporations limiting their employees to electronic mail, contacts and calendar as a result of they’re ready before making a decision on deploying MDM.

Christian Kane, analyst at Forrester research Inc.

IBM Endpoint manager for cellular gadgets likewise supports Symbian and Microsoft home windows phones. it's at present in Beta. The software makes it feasible for groups to selectively wipe traffic records if a tool is lost or stolen. it will probably even subsist used to configure passcode guidelines, encryption and VPN entry.

The application can work on both employee and corporate-owned mobile contraptions. It uses an agent to supply management capabilities. it may possibly likewise traverse company email access if it detects a tool isn't complying with corporate safety policies. The software will likewise subsist installed in hours, in response to IBM.

here's huge Blue’s first step into cell machine management market, however the enterprise has been bolstering its mobile portfolio, observed Christian Kane, an analyst of infrastructure and operations at Cambridge, Mass.-based mostly Forrester research Inc. Up formerly, IBM has been offering cell management via its knowledgeable features company, Kane noted.

Forrester has identified greater than forty MDM vendors that present a number of on-premise, hybrid and cloud-based mostly utility. Sybase and first rate know-how are among the many dependent leaders, Kane referred to. AirWatch and BoxTone are smaller contenders with extraordinary facets, he observed.

BigFix has lengthy labored with company computers and laptops, the usage of agents to realize machines that would not hold the newest antivirus, antimalware signatures and different supplier patches or are not configured properly to operate on the community. The BigFix software is scalable as much as hundreds of lots of devices. The company had a huge presence within the vigor management market.

corporations that gain a decision to deploy MDM are in particular installing it alongside BlackBerry commercial enterprise Server (BES), because most MDM suites don’t integrate well with BES, Kane said. Many more organizations are taking a wait-and-see strategy earlier than investing in MDM whereas the market consolidates and vendors add further capabilities, comparable to cellular software provisioning and protection, he stated.

“In conventional, they nevertheless behold many companies limiting their personnel to e mail, contacts and calendar as a result of they’re ready before making a option on deploying MDM,” Kane noted.

The company specializes in cellular progress software that allows developers to create cell apps across cellular gadget structures. Worklight’s middleware appliances act as a gateway to tie records core servers with cellular purposes the usage of XML files. Centralized administration utility gives IT teams a top even view of the deployed apps.

“We’re not just speaking in regards to the apps on the contraptions (and there are many contraptions), however additionally the backend server infrastructure fundamental and this has to subsist enterprise-ready,” wrote Bob Sutor, vice president of IBM cell Platform. “by this I suggest it must scale and likewise you hold to subsist capable of combine it with the capabilities, applications, techniques and data which are elementary to your corporation.”

try those actual occupy a inspect at questions for A2010-502 examination.
killexams.com questions and solutions helped me to know what exactly is expected within the examination A2010-502. I organized well inside 10 days of education and completed plenary of the questions of exam in 80 minutes. It incorporate the subjects much enjoy exam point of view and makes you memorize plenary of the topics easily and correctly. It likewise helped me to realize the way to control the time to complete the examination before time. its miles considerable method.

Save your time and money, occupy these A2010-502 and prepare the exam.
That is an virtually valid and dependable advantageous aid, with actual A2010-502 questions and accurate solutions. The testingengine works very clean. With greater statistics and exact customer support, this is a completely unique provide. No loose random braindumps available on-line can compare with the notable and the best undergo I had with Killexams. I exceeded with a in truth unreasonable rating, so Im telling this based on my private experience.

Try out these actual A2010-502 actual test questions.
preparing for A2010-502 books may subsist a difficult process and 9 out of ten probabilities are that youll fail in case you execute it with zero confiscate guidance. Thats where attribute A2010-502 e reserve comes in! It affords you with green and groovy data that no longer only complements your guidance however additionally offers you a clean cleave hazard of passing your A2010-502 download and stepping into any university with zero melancholy. I organized through this brilliant software and that iscored 42 marks out of 50. i will assure you that its going to by no means assist you to down!

wherein am i able to find A2010-502 trendy and up to date dumps questions?
A few specific guys cant deliver an alteration to the worlds way however they might only assist you to understand whether or notyouve were given been the best man who knew the way to execute that and i want to subsist recounted in this global and gain my non-public imprint and i hold been so lame my entire manner but I understand now that I preferred to snare a bypassin my A2010-502 and this can gain me well-known possibly and sure i am brief of glory however passing my A+ assessments with killexams.Com changed into my morning and night time time glory.

these A2010-502 actual occupy a inspect at questions works in the actual occupy a inspect at.
After trying numerous books, i was quite upset not getting the perquisite materials. i was seeking out a tenet for examination A2010-502 with simple language and properly-organized content material. killexams.com fulfilled my need, because it defined the intricate topics within the handiest way. inside the actual examination I were given 89%, which changed into beyond my expectation. thank you killexams.com, in your incredible manual-line!

it's miles genuinely awesome help to hold A2010-502 latest dumps.
I even hold earned better scores in A2010-502 certification with the assist of enormously affordable merchandise. I were given A2010-502 exam engine to execute away with tough ideas of this certification. I had offered A2010-502 exam braindump to hold shiny grades within the certification. It was perquisite decision due to the fact these merchandise are designed according to my mindset. It helped me to snare study in fifteen days and after this short time I had scored accurate with the assist of these sensible products consequently I am writing to Tell thanks to plenary of you for your wonderful services.

I feel very confident via getting prepared A2010-502 actual exam questions.
I would really recommend killexams.com to everyone who is giving A2010-502 exam as this not just helps to flick up the concepts in the workbook but likewise gives a considerable persuasion about the pattern of questions. considerable help ..for the A2010-502 exam. Thanks a lot killexams.com team !

proper locality to discover A2010-502 dumps paper.
That is the attribute examination readiness i hold ever lengthy beyond over. I surpassed this A2010-502 colleague exam pains unfastened. No shove, no tension, and no sadness amid the examination. I knew plenary that I required to recognize from this killexams.Com %. The inquiries are sizeable, and that i got notification from my associate that their coins once more surety lives up to expectancies.

real test questions modern day A2010-502 exam! source.
Im thankful to killexams.Com for his or her mock occupy a inspect at on A2010-502. I should skip the examination with out issue. Thank you over again. I hold moreover taken mock occupy a inspect at from you for my other assessments. Im finding it very advantageous and am confident of clearing this exam through attaining more than eighty five%. Your query monetary institution can subsist very advantageous and explainations are likewise incredible. Im capable of give you a four notable rating.

Try out these actual A2010-502 questions.
The killexams.Com fabric as well as A2010-502 Exam Simulator is going properly for the exam. I used both them and succeed within the A2010-502 exam without any trouble. The fabric helped me to research where I turned into weak, so that I progressed my spirit and spent enough time with the unique topic. In this manner, it helped me to establish together nicely for the examination. I want you accurate success for you all.

Unquestionably it is arduous assignment to pick dependable certification questions/answers assets regarding review, reputation and validity since individuals snare sham because of picking incorrectly benefit. Killexams.com ensure to serve its customers best to its assets concerning exam dumps update and validity. The vast majority of other's sham report dissension customers approach to us for the brain dumps and pass their exams joyfully and effortlessly. They never trade off on their review, reputation and attribute on the grounds that killexams review, killexams reputation and killexams customer certitude is imperative to us. Uniquely they deal with killexams.com review, killexams.com reputation, killexams.com sham report objection, killexams.com trust, killexams.com validity, killexams.com report and killexams.com scam. On the off desultory that you behold any erroneous report posted by their rivals with the cognomen killexams sham report grievance web, killexams.com sham report, killexams.com scam, killexams.com protest or something enjoy this, simply recall there are constantly Awful individuals harming reputation of splendid administrations because of their advantages. There are a huge number of fulfilled clients that pass their exams utilizing killexams.com brain dumps, killexams PDF questions, killexams hone questions, killexams exam simulator. Visit Killexams.com, their specimen questions and test brain dumps, their exam simulator and you will realize that killexams.com is the best brain dumps site.

Precisely very A2010-502 questions as in actual test, WTF!killexams.com IBM Certification contemplate guides are setup by their IT experts. Bunches of understudies hold been grumbling that there are such a great number of questions in such huge numbers of exercise exams and study aides, and they are simply worn out to tolerate the cost of any more. Seeing, killexams.com specialists work out this extensive variant while still guarantee that plenary the learning is secured after profound research and examination. Everything is to gain accommodation for hopefuls o

We hold their specialists operating ceaselessly for the gathering of actual test questions of A2010-502. plenary the pass4sure Questions and Answers of A2010-502 gathered by their crew are verified and updated through their IBM certified team. they hold an approach to retain connected to the candidates regarded within the A2010-502 exam to induce their evaluations just about the A2010-502 exam, they hold an approach to collect A2010-502 exam tips and hints, their fancy just about the techniques used at intervals the necessary A2010-502 exam, the errors they accomplished within the actual test once that enhance their braindumps consequently.
Click http://killexams.com/pass4sure/exam-detail/A2010-502
Once you tolerate their pass4sure Questions and Answers, you will feel assured regarding plenary the themes of test and information that your power has been greatly improved. These pass4sure Questions and Answers are not merely exercise questions, these are actual test Questions and Answers which will subsist sufficient to pass the A2010-502 exam first attempt.
killexams.com Discount Coupons and Promo Codes are as under;
WC2017 : 60% Discount Coupon for plenary exams on website
PROF17 : 10% Discount Coupon for Orders larger than $69
DEAL17 : 15% Discount Coupon for Orders over $99
SEPSPECIAL : 10% Special Discount Coupon for plenary Orders

The top notch approach to snare accomplishment inside the IBM A2010-502 exam is that you hold to amass dependable braindumps. They guarantee that killexams.com is the greatest direct pathway toward confirming IBM Assess: IBM Tivoli Endpoint Manager for Mobile Devices V2.1 Implementation exam. You might subsist sure with plenary fact. You can behold free inquiries at killexams.com sooner than you purchase the A2010-502 exam contraptions. Their brain dumps are in various decision the very As the genuine exam design. The inquiries and answers made by the guaranteed experts. They Think of the delight in of stepping through the actual exam. 100% assurance to pass the A2010-502 actual check.

killexams.com IBM Certification mull over distributions are setup by utilizing IT authorities. Clusters of understudies hold been crying that too much several inquiries in such colossal quantities of tutoring tests and study assistants, and they're of late exhausted to control the permeate of any additional. Seeing killexams.com pros exercise session this gigantic shape while still accreditation that plenary the data is anchored after significant examinations and exam. Everything is to gain encouragement for rivalry on their road to certification.

We hold Tested and Approved A2010-502 Exams. killexams.com offers the rectify and latest IT exam materials which basically involve plenary data centers. With the usher of their A2010-502 brain dumps, you don't ought to waste your plausibility on examining actual piece of reference books and for plenary intents and purposes necessity to consume 10-20 hours to pro their A2010-502 actual issues and replies. Additionally, they supply you with PDF Version and Software Version exam inquiries and answers. For Software Version materials, Its displayed to give indistinguishable undergo from the IBM A2010-502 exam in a genuine environment.

We supply free updates. Inside authenticity length, if A2010-502 brain dumps that you hold purchased updated, they will suggest you by electronic mail to down load most current model of . if you don't pass your IBM Assess: IBM Tivoli Endpoint Manager for Mobile Devices V2.1 Implementation exam, They will give you finish discount. You necessity to dispatch the verified propagation of your A2010-502 exam archive card to us. Ensuing to keeping up, they can quickly Think of plenary REFUND.

In the occasion which you prepare for the IBM A2010-502 exam utilizing their testing programming program. It is whatever anyway violent to subsist triumphant for plenary certifications inside the most imperative endeavor. You don't necessity to deal with plenary dumps or any free deluge/rapidshare plenary stuff. They give free demo of every IT Certification Dumps. You can examine the interface, inquisition superb and solace of their instruction appraisals sooner than you purchase.

Cheetah Mobile Reiterates its Third Quarter 2017 Total Revenue Guidance

BEIJING, Oct. 27, 2017 /PRNewswire/ -- Cheetah Mobile Inc. (NYSE: CMCM) ("Cheetah Mobile" or the "Company"), a leading mobile internet company that aims to provide leading apps for mobile users worldwide and connect users with personalized content on the mobile platform, today responded to the allegations raised in a short seller's report dated October 26, 2017.

Cheetah Mobile believes these allegations are unfounded and hold numerous errors, unsupported speculation, and a common misunderstanding of the industry and the Company's traffic model. The Company stands by its publicly reported monetary results and its public disclosures regarding the Company's business. The Company has informed its board of directors and its independent auditors of the report, and will conduct a review of the allegations as appropriate. Today the Company would enjoy to clarify sure key errors in the report.

Allegations Regarding Live.me:

i) Comparison with YouNow

The allegations question Live.me's revenue based on comparison with YouNow. As Live.me is well ahead of YouNow on metrics such as user downloads and total grossing ranking according to publicly available data. It is not meaningful to compare the revenue of Live.me and YouNow.

Live.me and YouNow's Download Rankings on Google Play

Live.me was among the top 10 social apps in the U.S. on Google Play in terms of user downloads V.S. YouNow among the top 50.

Live.me and YouNow's Download Rankings on Apple's App Store

Live.me was among the top 35 social apps in the U.S. on Apple's App Store in terms of user downloads V.S. YouNow among the top 66.

Live.me and YouNow's low Rankings on Google Play

Live.me remained the No. 1 grossing social app in the U.S. on Google Play V.S. YouNow among the top 25.

Live.me and YouNow's low Rankings on Apple's App Store

Live.me was among the top 5 grossing social apps in the U.S. on Apple's App Store V.S. YouNow among the top 30.

In addition, Live.me is materially different from YouNow in several key aspects of its traffic model. For example, Live.me has significantly more mobile users than YouNow, who exhibit fundamentally different behaviors than PC users. Also, through a so-called "Back to Coin" feature, a broadcaster can transfigure virtual gifts he or she receives into coins and give them to his or her followers and other broadcasters and users. It is an effectual mechanism to transform virtual gifts into a social currency to foster a vibrant and robust social environment on the platform.

ii) Users and broadcasters' spending pattern

The allegations used incorrect methods to rate the cost of coins and so arrived at the wrong conclusion that top broadcasters gave away more than they received. They likewise questioned the spending patterns of viewers and broadcasters, which shows a fundamental lack of understanding of the live broadcasting industry and Live.me in particular. Live broadcasting with virtual gifting is a relatively recent phenomenon, which first became very common in Asia only in the final yoke of years. Many users are willing to spend significant amount of time and money to relish these types of interactions they otherwise may never subsist able to experience. Live.me is one of the pioneers that started this traffic model in the U.S. and has enriched the lives of many people.

In addition, many broadcasters are themselves viewers of other broadcasters and thus are willing to dispatch virtual gifts to others. Based on the Company's data, about 80% of users on the Live.me platform shared virtual gifts they received with other users on the platform.

iii) Broadcasters' followers

The allegations suggest that top earning broadcasters are fake because they don't hold many followers on mainstream social platforms. This actually is a unique feature of Live.me because it has cultivated a significant number of home-grown online celebrities who were not online celebrities already common on other social platforms. Many unknown ordinary people hold become extraordinary online stars on Live.me and their experiences are quite inspirational. For example, one of the Company's broadcasters in the U.S. was a solider. After returning to the U.S. from overseas deployment, he lost an arm in a traffic accident. Yet, he didn't give up on life. He became a live broadcaster on Live.me and gained significant popularity. His life narrative inspires many fans to occupy on life's challenges with a positive attitude.

iv) User account

The allegations likewise suggest that many of the company's users are fake because their user names are similar. This can subsist a mixed result. On the one hand, it is common for many online users to hold user names similar to well-known figures or sure common phrases. For example, there are about 60 accounts having cognomen similar to singer Taylor Swift on Twitter based on a quick search. On the other hand, there might subsist "fake accounts" on the platform created by illegitimate users. Fake accounts are a problem across social networks (e.g. Facebook, Twitter), and Live.me is committed to fighting account fraud. The Live.me team is actively edifice machine learning content moderation tools to detect and combat fraud.

Allegations Regarding Utility Products:

i) User Data

The Company stands by its previously disclosed user MAUs. While there has been sure decline in the MAUs of clean Master and Security Master since early 2015, the Company has launched a series of recent casual games since late 2015, and these casual games reached around 100 million MAUs in the halt of the second quarter of 2017. The Company's other utility products such as CM Launcher and Cheetah Keyboard likewise hold gained significant growth in user base. For example, CM Launcher has remained one of the top 3 personalized apps in the U.S. on Google Play since May 2017 according to App Annie. The allegations rate of the Company's total MAUs based on incomplete information relating to just a subset of the Company's many products is entirely misleading. In addition, users often hold multiple Cheetah Mobile products installed in a single phone and such users will subsist counted only once in deriving the Company's overall MAUs. Thus, the loss of a user in one product may not reduce the MAUs accordingly.

ii) Facebook effect

It is exact that in 2015, Facebook was the main third-party advertising platform which contributed to most of the Company's overseas revenues for utility products. While revenue contribution from Facebook decreased over the final two years, the Company remains a significant traffic colleague of Facebook and is one of the largest distributors of Facebook in the China market. In addition, the Company has diversified its revenues sources and it is working with multiple advertising networks including Google Admob, Twitter, Yahoo and other Ad exchanges. Facebook only contributed to 22% of the Company's mobile utility revenues in the second quarter of 2017.

iii) Sales team

The allegations question the revenues of the Company's utility products and services because of the departure of sure sales people. This likewise reflects a fundamental misunderstanding of the Company's business. The Company's direct sales team that sources advertisers only contributed a small portion of the revenues for utilities products, while the majority of such revenues are directly from third party advertising networks such as Facebook and Google Admob, which execute not require the significant involvement of a sales team.

iv) Utility products' usefulness

The allegations claimed that the Company's utility products are "useless". On the contrary, the Company's core utility products clean Master and Security Master received 4.7 scores in Google Play with more than 40 million and 24 million users respectively participating in the review. In addition, the Company's junk file cleaning functions hold been embedded in mainstream mobile phones such as Samsung and Xiaomi models to provide file cleaning services. Cheetah Mobile Security Master (4.2) received the best antivirus software for Android award according to an AV-TEST Product Review and Certification Report – Sep/2017. That report can subsist accessed at https://www.av-test.org/en/antivirus/mobile-devices/android/september-2017/cheetah-mobile-security-master-4.2-173506.

Allegations Regarding Cheetah Mobile's Other monetary Matters

i) Cash Balance

The Company stands by its previous disclosure that as of June 30, 2017, the Company had cash and cash equivalents, restricted cash and short-term investments of RMB2,383.3 million (US$351.5 million). The Company maintained strict internal control procedures. The Company regularly reconciles cash and cash equivalents and time deposits with its bank statements and documented the bank statements and reconciliation reports every month. The Company received unqualified opinions regarding its internal control over its monetary reporting as of the years ended December 31, 2015 and 2016, respectively, from its independent auditor. Further information regarding the Company's interest income and expenses are provided below.

Interest Income, net

Interest income and interest expense are netted and disclosed as "Interest income, net" in the Company's monetary statements.

Year Ended December 31,

2014

2015

2016

RMB

RMB

RMB

US$

Interest income

28,221

15,097

15,675

2,258

Interest expense

-

(547)

(7,892)

(1,137)

Interest income, net

28,221

14,550

7,783

1,121

Interest income fluctuation

The interest income for the second quarter of 2017 was RMB6.89 million, and decreased by 29% compared to the interest income of RMB9.68 million for the fourth quarter of 2014, which mainly reflects the combination of an increased amount of cash bank balances and the significant dwindle in deposit interest rates for RMB and USD accounts.

CMCM Reported Cash poise vs Interest Income

As of

31-Dec-14

30-Jun-17

RMB

RMB

(in thousands)

Cash and cash equivalents

1,115,738

1,848,638

Time deposits recorded in short-term investments

428,330

440,472

Total cash and bank balance

1,544,068

2,289,110

% inc/(dec)

48%

For The Three Months Ended

31-Dec-14

30-Jun-17

RMB

RMB

(in thousands)

Interest income, net

9,678

3,380

- Interest expense

-

(3,517)

- Interest income

9,678

6,897

% inc/(dec)

-29%

ii) Capital Expenditure

The Company is an asset light company. It has moved away from buying and utilizing its own servers and almost plenary of the Company's apps are deployed in cloud systems such as Amazon Web Services. The Company incurred significant costs for these cloud services, bandwidth and internet data heart expenses. plenary of these expenses are included in the cost of revenues, which amounted to RMB1,543.8 million (US$222.4 million) in 2016.

iii) Share-based compensation expenses

A number of factors contributed to a dwindle in share-based compensation in recent quarters. The Company granted a significant number of equity awards in 2014 and 2015. It has elected to recognize share-based compensation using the accelerated manner for plenary equity awards granted with graded vesting. The Company has not granted similar equity awards in subsequent years, and the Company's share prices hold been in a downward trend. As a result, the Company's share-based compensation expenses are more front loaded during the previous several years.

iv) Debt

The allegations question why the Company still has about $70 million debt while its cash poise is growing. There is nothing unusual about this, as the Company has multiple units operating across several countries. It is common exercise to maintain a banking relationship with multiple monetary institutions for better liquidity management.

Allegations Regarding OrionStar Investment:

The allegations title that the OrionStar investment is a vehicle for the misappropriation of shareholder capital. Because the transaction is considered a related-party transaction, the Company has followed strict procedures to ensure the fairness of the investment. Each of the Company and Kingsoft Corporation, the parent company of Cheetah Mobile, engaged an independent appraiser to evaluate the transaction and the audit committee of the Company has approved the transaction as well. Several external investors likewise invested in OrionStar at the very valuation.

Allegations Regarding Management Departure and Selling Shares:

The allegations cast the departure of Mr. Ka Wai Andy Yeung, the Company's former CFO, as a red flag indicating the Company is in difficulty. Mr. Yeung is a well-respected U.S. trained professional. Before his departure in March 2017 for another traffic opportunity, he has been with the Company for nearly three years. The current CFO, Mr. Vincent Zhenyu Jiang, joined the Company in April 2017, he is a CFA charter holder and likewise an attorney registered in the State of recent York, and previously worked at the prestigious Wall Street law firm Skadden, Arps, Slate, Meagher & Flom LLP.

Cheetah Mobile reiterates its third quarter monetary forecast of total revenues to subsist between RMB1,150 million (US$170 million) and RMB1,210 million (US$178 million), representing a year-over-year multiply of 2% to 7%.

About Cheetah Mobile Inc.

Cheetah Mobile is a leading mobile internet company. It aims to provide leading apps for mobile users worldwide and connect users with personalized content on the mobile platform. Cheetah Mobile's products, including its common utility applications clean Master, Security Master and Battery Doctor, help gain users' mobile internet undergo smarter, speedier, and safer. Leveraging the success of its utility applications, Cheetah Mobile has launched its line of mobile content-driven applications, including tidings Republic and Live.me.

Cheetah Mobile provides its advertising customers, which embrace direct advertisers and mobile advertising networks through which advertisers dwelling their advertisements, with direct access to highly targeted mobile users and global promotional channels, which are capable of delivering targeted content to hundreds of millions of users.

Safe Harbor Statement

This press release contains forward-looking statements. These statements, including management quotes and traffic outlook, constitute forward-looking statements under the U.S. Private Securities Litigation Reform Act of 1995. These forward-looking statements can subsist identified by terminology such as "will," "expects," "anticipates," "future," "intends," "plans," "believes," "estimates" and similar statements. Such statements involve inherent risks and uncertainties. A number of factors could reason actual results to disagree materially from those contained in the forward-looking statements, including but are not limited to the following: Cheetah Mobile's growth strategies; Cheetah Mobile's faculty to retain and multiply its user base and expand its product and service offerings; Cheetah Mobile's faculty to monetize its platform; Cheetah Mobile's future traffic development, monetary condition and results of operations; competition with companies in a number of industries including internet companies that provide online marketing services and internet value-added services; expected changes in Cheetah Mobile's revenues and sure cost or expense items; and common economic and traffic condition globally and in China. Further information regarding these and other risks is included in Cheetah Mobile's filings with the U.S. Securities and Exchange Commission. Cheetah Mobile does not undertake any obligation to update any forward-looking statement as a result of recent information, future events or otherwise, except as required under applicable law.

In the organized chaos of e-business support systems, enterprise access management (EAM) vendors Tell they present the "Holy Grail" of security: a single sign-on (SSO) solution that authenticates users to your Web portal and authorizes access to censorious back-end applications.

But your quest doesn't halt when you purchase an EAM solution. There is no miracle in that box.

The benefits of EAM are clear. Market-leading products from Netegrity, RSA Security, IBM/Tivoli and others provide censorious security and management functions including role-based access control, content personalization, user self-registration and hooks into other security products, such as firewalls, provisioning systems and IDSes. Many EAM solutions can ply multiple authentication options (e.g., user ID/passwords, digital certificates, authentication tokens) and several types of user repositories (LDAP, RACF, NT, etc.). These solutions likewise present auditing services and intuitive Web-based interfaces for user and resource management. In short, you can gain a compelling traffic case for EAM, and thousands of organizations are rolling out these solutions today.

Despite these and other benefits, making EAM software work in a heterogeneous enterprise is a intricate challenge. Whether your organization is a bank, a health custody provider, an insurance agency or another traffic enterprise, unanticipated issues are almost sure to impact rollout. Getting the most bang for your buck requires significant up-front architectural planning and design, infrastructure investments, process reengineering, training and a change leadership strategy. The bottom line is that implementation is neither as simple nor as smooth as some vendors would hold you believe.

The Benefits: What EAM Can Do

EAM products can bring order to what is often a chaotic Web-based enterprise system. Understanding the core capabilities of these products will help you match your traffic requirements to the perquisite solution and gain the case for purchase.

1. Single sign-on can subsist achieved across Web-based applications. SSO has been an elusive goal for security practitioners since the advent of client/server computing. Prior to the Internet, a number of products -- typically based on intricate scripting languages-attempted to address SSO for mainframe, midrange and client-server environments. Behind the scenes, these products were actually storing the user IDs and passwords of each user for each application that they needed to access. In intricate IT environments, implementation was difficult and administration onerous.

EAM products address this issue in different ways. Netegrity's SiteMinder 4.6 and RSA's ClearTrust SecureControl 4.6.1 (formerly owned by Securant Technologies) provide SSO across Web applications residing on different Web servers -- within the very domain only -- using a secure, nonpersistent, encrypted cookie on the client interface. Assuming that each of the Web servers is protected by an agent, the cookie is presented to each application that the user wants to access.

IBM/Tivoli's Policy Director 3.7.1 takes a different approach. A secure credential is built for the user on Policy Director's WebSeal, a reverse proxy that sits in front of the Web server. The credential is presented each time a user attempts to access Policy Director-protected Web applications.

Each of these three vendors is planning on supporting both the cookie- and proxy-based SSO methods in upcoming releases.

2. Authorization logic can subsist abstracted out of the applications. EAM solutions provide basic centralized authorization to give users access to multiple Web-based applications. For example, Tivoli's Policy Director provides an "entitlement" service that will dynamically build a list of plenary applications that a user is "authorized" to access.

The entitlement page is built once the user has been authenticated by Policy Director. Policy Director may protect dozens of applications, but the user will only behold links to the applications that he is "entitled" to access.

SecureControl 4.6.1 has a particularly spellbinding feature for authorization called "Smart Rules," which provide "dynamic permissioning." This means SecureControl can change a user's authorizations at runtime based on variable data, such as current credit balance.

3. Content can subsist personalized. EAM-based content personalization can change the access interface or system actions based on user information. For example, when a user attempts to access a Web application, additional information (attributes) can subsist passed to deliver a personalized response. For instance, if User A belongs to the Senior Payroll Analyst group, his HTML page will pomp four buttons for four different types of payroll transactions to subsist executed. If User B belongs to the Junior Payroll Analyst group, he will behold only two buttons.

Developers can code the application to gain utilize of this capability. One state health custody agency, for example, made this a fundamental requirement for Web-based access to three key applications for customers and employees.

In order to extend this functionality, many EAM vendors are working on developing hooks into standard portal applications such as Epicentric, PlumTree, BroadVision, Vignette and ATG. Netegrity recently acquired DataChannel, a portal vendor.

4. Administration functions can subsist delegated. One of the most valuable features of EAM solutions is the faculty to delegate security administration. This is particularly valuable when you want to delegate authority for a hosted application to a traffic partner.

The potential cost savings could subsist significant depending on how many traffic partners would otherwise subsist centrally administered.

Caveats: What EAMs Can't Do

Though EAM solutions hold impressive capabilities, they likewise hold limitations. Knowing these shortcomings will help you set realistic expectations, gain smart purchasing decisions and draw for integration.

1. It's not plug-and-play. Some EAM vendors crow about how quickly their product can subsist up and running out of the box. In one case, a vendor claimed that they could execute it in under a day at the client's site. What the vendor didn't Tell was that meant a stand-alone NT server connected to no applications, with only a yoke of test users.

The reality is that much planning, architecture and design is needed to implement any of the EAM solutions in a intricate environment:

Current traffic tide and roles must subsist adapted to the recent paradigm.

The application progress draw must subsist thoroughly integrated with the EAM requirements.

Even "simple" implementations will pan issues that impact the project. For example, one insurance company required Web-based authentication to a single application only, without intricate levels of authorization. Nevertheless, the firm still had plenty of intricate integration issues to deal with.

2. EAM doesn't deliver intricate authorizations out of the box. No EAM product addresses intricate authorization logic without customization. The degree of custom authorization code depends on the EAM solution and the complexity of your application. Often, custom code in the application will subsist needed to invoke the authorization engine through the vendor API, which could require a significant amount of development.

3.Cross-domain interoperability is a problem. One of the biggest gaps in the EAM space is the inability to pass security credentials between different EAM/custom Web security solutions. In a likely scenario, a customer logs on to your Web portal, protected by EAM Solution A, to conduct a transaction. But information needed to complete the transaction must subsist obtained from a traffic partner's site, protected by EAM Solution B. When the customer clicks your traffic partner's link within your portal, he will most likely subsist required to re-authenticate, since the security credential generated by one product isn't recognized by the other.

An XML-based protocol, SAML, is being developed to address this issue (more on this later).

People and Processes Count

Perhaps the biggest impediment to EAM deployment is underestimating the scope of the project.

EAM solutions impact three censorious parts of any business: people, process and technology. Typically, the technology gets most of the attention and the people and processes are given short shrift. If that happens, the project will falter, and the results won't approach the goals for the implementation, at least not without a lot of extra time, money and aggravation. Focusing on three censorious areas before implementation begins will help assure success:

Administration. Depending on current system administration processes, the EAM solution may insert significant change. If a company currently administers users centrally, for instance, delegated administrative services will picture a sea change in how users and roles are provisioned.

Roles. plenary EAM solutions hold different methods of implementing roles. Understanding those roles will help determine the number and type of roles that must subsist administered. Where possible, defining enterprise-level roles that are universally understood across e-business applications will maximize the power of EAM.

Business processes. Creating an authorization logic that spans a heterogeneous enterprise requires a thorough understanding of how traffic flows through the organization. This is best done through utilize cases. In simple terms, this means sitting down with users representing various traffic roles and documenting workflow.

Deploying EAM involves everyone from systems managers and developers to halt users. A change leadership strategy should embrace a communications plan, a training draw and a stakeholder analysis. Everyone in the organization should understand their roles and responsibilities and receive confiscate training.

Learned in the Trenches: Making EAM Work

There are several basic steps that lay the foundation for a smooth and successful EAM deployment.

1. Invest time in architectural analysis and design. EAM implementation can hold a profound upshot on current and future IT architectures. Understanding how EAM will subsist integrated will spell getting it perquisite the first time. Key architectural elements to reckon include:

Legacy data integrity

Data relationships

LDAP schema and namespace design

High-availability computing

Middleware components

Back-end security systems integration, such as RACF

Assuming you are integrating multiple applications, you'll want your LDAP schema to subsist complete on the first pass. Analyzing applications that will approach under the EAM umbrella will reveal common data elements that determine authorization decisions. Such a data factor may subsist a user role that means the very exact thing to multiple applications (e.g., "claims adjuster"). The results of this analysis will subsist direct inputs into the schema design for the EAM product's user repository (e.g., LDAP).

Without this analysis, the schema design will most likely subsist tightly coupled with the first application integrated with the EAM product. When the second and third applications are on deck for deployment, the schema will hold to subsist modified to accommodate those applications' authentication and authorization requirements. That, in turn, could require recoding the first application. The result is delay, and a lot of extra time and money.

2. await bugs. Fastest to market wins. Software vendors ramp up their progress cycle to beat the competition to market. attribute assurance suffers, and the result is often software bugs.

It's reasonable to await to encounter bugs and draw for them in an EAM implementation. Vendors conduct much of their testing in greenfield environments. Even with strong testing and QA, vendors will never subsist able to find every bug simply because of the diversity and complexity of the IT environments in which their products are deployed.

The project draw should allow sufficient time for unit and string testing the solution. The string testing of the EAM solution should subsist linked to the application's string testing, and thus coordinated with the application deployment team.

3. Double estimates for progress efforts. Much of the excitement surrounding EAM is the pledge that authorization logic can subsist abstracted from applications and deployed within the EAM solution. In theory, this would save on progress effort, since reusable authorization logic could subsist invoked by any application that needed it. But EAM products aren't yet at this stage. draw on a lot of progress time.

The most effectual way to determine how much progress pains is required is to assemble plenary of the functional authentication and authorization requirements for the applications to subsist integrated. Combined with utilize cases describing how the application will work, the functional security requirements should provide a splendid rate of the progress time, including custom security coding. As a rule of thumb, double that estimate. It's not unusual for intricate EAM rollouts to occupy several months from purchase to initial launch.

4. Create standard interfaces. Many EAM solutions provide security APIs to enable applications to invoke security functionality beyond what you snare out of the box. But these aren't standard APIs, so draw on a learning curve for developers. More importantly, the application itself will subsist bound to that API, so the application code must subsist rewritten if one EAM solution is replaced with another, or if the application/platform is upgraded to a recent release.

Creating an application isolation layer via standard interfaces will reduce the necessity for costly and time-consuming re-engineering by shielding applications from vendor-specific code.

Looking ahead, an extension to the Java security model called Java Authentication and Authorization Service (JAAS) addresses this issue.

5. Build security from the bottom up. Many organizations don't snare the plenary benefit of EAM because there isn't a well-defined design for the security process that exploits the plenary sweep of EAM authorization functionality. Or, sometimes the security design isn't integrated with the application progress team's systems progress life cycle (SDLC).

In either case, the progress team will subsist hard-pressed to proceed back and redesign its application if and when security requirements are introduced. Changing requirements for a Web-based cash management application, for example, hindered integration at a major banking institution. The result is detain or, worse, a deployment that only takes edge of the product's basic authentication features.

Contrast this with a success story-a site in which the security process was integrated into the progress team's SDLC from the earliest stages of progress planning. This "security-aware" SDLC was accessible to the organization's progress community via their intranet. At each aspect of the SDLC, the EAM implementation team guided the developers through the apposite security process points. The result was a robust EAM implementation, unimpeded by changing requirements.

Interoperability among EAM products is a problem in search of a solution. It's censorious to establish a way to jump from a host Web site to a traffic partner's Web site without having to re-authenticate. EAM vendors such as Oblix, IBM/Tivoli, Netegrity, RSA Security, Entrust and Entegrity are working on an XML solution for the exchange of authentication and authorization information among EAM products.

The protocol, noted above, is called Security Assertion Markup Language (SAML), and is being sponsored by the Organization for the Advancement of Structured Information Standards (OASIS). SAML defines a common language for describing authentication and authorization "assertions." final fall, Netegrity released a Java-based SAML developer toolkit called JSAML.

As mentioned above, Java Authentication and Authorization Service (JAAS) enables developers to implement authentication and access control functionality while minimizing vendor-specific coding within the application. This will allow customers to switch EAM vendors and/or upgrade their applications or platforms without extensive recoding. Leading EAM vendors such as IBM/Tivoli and Netegrity already provide support for JAAS.

Application server authentication and authorization will subsist employed by EAM products to provide granular access control out of the box. Many high-end application servers -- such as BEA's WebLogic Enterprise edition and iPlanet's Application Server Enterprise Edition -- provide their own native authentication and authorization security mechanisms. However, these mechanisms can only subsist leveraged by the applications written on the application server platform. Thus, other platforms, such as client/server and legacy systems, would still necessity to subsist secured and managed by yet another security solution.

When an application server's security system is integrated with an EAM vendor's solution, the result is one centrally managed, policy-based security solution that allows security policy to subsist applied and managed across Web-based, client/server and legacy applications. Examples of this benevolent of integration are between IBM/Tivoli's Policy Director with IBM's WebSphere, Entegrity's AssureAccess and RSA's ClearTrust SecureControl's with BEA's WebLogic application server, and Oblix's NetPoint with iPlanet's application server.

These global enhancements, coupled with the evolution of specific product features, bolster the case for EAM. With the perquisite amount of intelligence and effort, EAM becomes a viable security solution for today's e-business, with the pledge of better things to come.

Goliaths Vie for 'Net SSO Supremacy

Microsoft and Sun Microsystems are pumping emulate plans for global SSO authentication to prime commerce on the Internet. Consumer and traffic users would hold a single profile that would vouchsafe access to services across the 'Net, using any platform.

Microsoft's Passport, share of its .NET My Services initiative, already has a foundation of 165 million accounts, amassed largely from automatic registrations signing up for Hotmail and Instant Messaging. The company's latest OS, Windows XP, continually prompts users to register for this service.

Sun's Liberty Alliance, announced in October, started with 50 companies, including Bank of America, GM and United Airlines. The Alliance would allow a user to sign up at a secure interface and access customized information services.

AOL Time Warner, the third player in the arena, hopes to leverage its 31 million subscribers to gain its Magic Carpet the standard.

Health custody case study: The personal touch

RSA's SecureControl makes delegated administration a no-brainer.

Health custody providers are particularly sensitive to security because of federally mandated protection of patient information under the Health Insurance Portability and Accountability Act (HIPAA). Transmitting sensitive medical data across the Internet, intranets and extranets leaves no margin for error.

A state government chose RSA Security's ClearTrust SecureControl 4.6.1 because it delivers on EAM's value in providing delegated administration and personalization. When the job was done, both patients and internal users had secure, single sign-on access to applications of three state-run health custody providers through a Web portal. Authorization and personalization for plenary three applications was managed via dynamic, customized JSP Web pages.

Delegated administration is a major strength of SecureControl. Its module provides an easy-to-use Web interface to create users quickly. This office can subsist delegated to other administrators within an organization or at a traffic colleague site, which relieves the burden of routine functions from central administration and can reduce costs substantially over time. The robustness and flexibility of the Delegated Administration module hold earned towering marks in the industry, making it a splendid match for this agency.

There was an issue with personalization, however. The agency's Web page personalization displays the user's plenary cognomen and dynamically filters links, so the user sees only what he's authorized to access. SecureControl's Runtime API was used to filter the links, but couldn't tug basic user information, such as first and final name, from its LDAP user repository. The agency used SecureControl's Admin API to complete the task, which made the JSP pages heavier, since it was making calls to both objects. Also, the Admin API is used to upshot censorious changes to user data, and employing it in this context made the pages more sensitive.

The agency's user store was another major issue, since Secure Control doesn't hold native support for LDAP v3-compliant directories. Secure Control provides for data synchronization between Oracle and LDAP, so the solution user information was replicated in an Oracle database. However, this made managing and manipulating data attributes difficult. RSA plans native LDAP v3 support in its next release to address this problem.

There's no such thing as a simple EAM implementation. There's no such thing as plug-and-play.

The installation of IBM/Tivoli's Policy Director 3.7.1 at a major insurance company was about as straightforward as an EAM deployment can get: snare Policy Director up and running with one e-business application within nine weeks. Still, there were significant obstacles to deployment. The implementation team met the deadline -- but not without some smart -- and eventually integrated additional applications.

As with many EAM deployments, the insurance company was a "traditional" traffic that wanted to expand its e-business component. To execute so, it needed to simplify access and authorization -- securely. The company started with what was, in effect, a pilot project for Policy Director. The firm required authentication to a Web-based version of a mainframe quoting application used by customer services representatives and insurance agents to process automobile insurance quotes. The security integration for the e-business application was fairly simple, using only the most basic EAM capabilities. Policy Director only authenticated the user against the LDAP, while the Java servlet that handled security continued to check if the user was authorized to behold the quote.

Since Policy Director is a reverse proxy product -- compared to the agent-based SiteMinder and SecureControl -- it doesn't matter what type of Web server is being protected. That's a expansive plus for potential users concerned about support for existing platforms. In this case, since both the Web and application servers were likewise IBM products, the point may subsist moot, but it opens a limpid path to bring in other products.

Out of the box, Policy Director provides an authentication layer for applications, with its WebSeal sitting in front of the Web server. Ironically, in an end-to-end IBM environment, the first issue arose when the junction between the WebSeal and IBM WebSphere application server was created. The company was unable to create a connection between the browser and the quoting application on the application server. This turned out to subsist a mapping issue resulting from an undocumented configuration detail. Updating WebSphere's Virtual Host mapping tables solved the problem.

Core dumps on one of the WebSeals brought the system down and cleave connections to protected back-end resources on two occasions. Redundant WebSeals, along with frequent monitoring, mitigated the problem. IBM/Tivoli says it addresses the issue in its recent release, Policy Director 3.8.

Policy Director did a poverty-stricken job of allowing user attributes to subsist added to provide granular access control, but has likewise addressed this in v3.8. Policy Director automatically provided two variables, IV-User and IV-Groups (user and group/role IDs), which were passed as HTTP headers to the back-end application. Policy Director recognized only user ID, password and a few other attributes within the LDAP.

Financial institutions are prime candidates for EAM deployment. intricate levels of authorization are required for internal employees and customers dealing with everything from checking accounts to multi-million dollar traffic loans.

The monetary institution for this case study is an older organization that has grown slowly into e-commerce as a way to enhance more traditional methods of doing business. The bank wanted to deploy a Web-based application to allow individual and corporate customers to access recent repositories as well as legacy systems.

Specifically, the bank wanted to develop a Web-based version of a cash management application on a WebSphere application server. The firm chose Netegrity's SiteMinder 4.5 to provide single sign-on access and authorization.

When rolling out SiteMinder, the bank learned some valuable lessons the arduous way. EAM security should always subsist integrated as share of the progress draw before coding begins. In the bank's case, numerous changes in functional requirements for the cash management application -- a profile of "project creep" -- slowed the SiteMinder integration. Application development, particularly custom coding to license user requests through the EAM API, was inextricably bound to the integration. Changes in requirements had a cascading impact on implementation.

Difficulties with the configuration and maintenance of the WebSphere server, used for progress of the application integration code, caused the most significant integration issues. Documentation was poverty-stricken and configuration clumsy.

The SiteMinder agent for IBM HTTP servers was custom built for this project (support for IBM HTTP is included in the current version, SiteMinder 4.6). SiteMinder provides plug-ins on Web servers to provide URI-level security and application server agents (ASA) to protect resources, such as servlets or Enterprise Java Beans. The plug-in/ASA intercepts calls from a browser, and the SiteMinder Policy Server checks the database to behold if the requested resource is protected. If it is, the Policy Server first authenticates the user, then checks if the user is authorized to access the resource.

Several issues with SiteMinder itself highlighted the uniqueness and complexity of the deployment-and the necessity to draw accordingly:

Policy Server was installed on Solaris at the client's request, but the SiteMinder report server was only available for NT. A single instance of the SiteMinder Policy Server on NT was installed for reporting purposes only.

The SiteMinder Administration interface was only compatible with IIS or Netscape Web servers, which had to subsist installed on the very machine as the Policy Server. Again, the client's standard IBM HTTP server could not subsist used. A single instance of Netscape Web Server was installed for SiteMinder administration only.

SiteMinder Self-Registration and Delegated Management Services did not office with the client's Oracle user store, as Netegrity developed these services for utilize with LDAP directories only. The integration team developed a self-registration component. One of SiteMinder's major strengths is enabling users to self-register. This means extranet users (e.g., traffic partners or customers) can create their own users IDs and passwords, a potential huge savings in administrative overhead over time.

Virtualization Engine(TM) Resource Dependency Service (RDS) offers a view of your heterogeneous IT environment. Running on the Linux(TM) operating system, RDS focuses on the discovery and mining of information from existing applications, tools, and IT systems. It then displays a view of those assets.

With RDS you can examine your current IT environment for assets and correlate them to their traffic functions. You can then assess potential monetary and traffic costs associated with resource outages.

RDS is the first stage of developing a representation of the resources for and relationships between components so that they can become on require services.

Back to top

Key prerequisites

Refer to the Hardware requirements and Software requirements sections.

Back to top

Planned availability date

February 10, 2006

Back to top

Description

Virtualization Engine Resource Dependency Service (RDS)Virtualization Engine RDS is a core edifice block that supports Virtualization Solution for on require technologies with the following goals:Simplifying management of IT resourcesEnabling on require heterogeneous IT infrastructuresReducing operational costs and improves resource utilizationIncreasing IT infrastructure flexibility to help time-to-value of recent applications, servers and storageEnhancing end-to-end traffic service even achievementRDS can help you understand and manage resources across multiple diverse platforms and in their entire IT infrastructure. This technology locates resources and their relationships to help you understand the impacts associated with these resources.

The on require environment requires the faculty to represent, manage, and provision a diverse set of physical and logical IT assets that are censorious to your environment. RDS implements and develops a representation of the resources and relationships between components so that they can subsist converted to on require services.

RDS focuses on discovery and the mining of information from existing applications, tools, and IT systems, and presenting a static view of those resources and assets. It uses techniques to both discover and extract resource and relationship data from existing applications, and your existing traffic processes. The discovered resources embrace IBM and non-IBM servers, storage, networks, and applications. Discovery is accomplished without the utilize of agents and is as unobtrusive as possible.

With RDS you can assess your current IT environment for resources and assets and their connections to your traffic functions. You can utilize this information to determine the impact of planned or unplanned outages (along with other aspects) of various IT resources. With the faculty to visually link the unavailability of resources with the impacted traffic functions, you can assess the potential monetary and traffic costs associated with the resource outage.

Section 508 of the U.S. Rehabilitation ActIBM Virtualization Engine Resource Dependency Service, V2.1 is capable, when used in accordance with IBM's associated documentation, of satisfying the applicable requirements of Section 508 of the Rehabilitation Act, provided that any assistive technology used with the product properly interoperates with it. You can request a U.S. Section 508 Voluntary Product Accessibility Template (VPAT) at

Refer to Software Announcement 205-283 , dated November 8, 2005 for IBM Virtualization Engine and Infrastructure Services for Linux on System z9(TM) and zSeries® V2.1.

Business colleague informationIf you are a Direct Reseller - System Reseller acquiring products from IBM, you may link directly to traffic colleague information for this announcement. A PartnerWorld ID and password are required (use IBM ID).

BP Attachment for Announcement missive 205-287

Trademarks

Virtualization Engine, i5/OS, iSeries, and System z9 are trademarks of International traffic Machines Corporation in the United States or other countries or both.

pSeries, xSeries, z/OS, and zSeries are registered trademarks of International traffic Machines Corporation in the United States or other countries or both.

Linux is a trademark of Linus Torvalds in the United States, other countries or both.

Other company, product, and service names may subsist trademarks or service marks of others.

Back to top

Education support

IBM Global Services, IT Education Services, provides education to support many IBM offerings. Descriptions of courses for IT professionals and managers are on the IBM IT Education Services Web site

Product information is available via the Offering Information Web site

http://www.ibm.com/common/ssi

Back to top

Publications

No publications are shipped with this programs.

Documentation is available from the IBM Systems Software Information Center:

http://publib.boulder.ibm.com/infocenter/eserver/v1r2/index.jspThe IBM Publications Notification System (PNS) enables subscribers to set up profiles of interest by order number/product number. PNS subscribers automatically receive e-mail notifications of plenary recent publications defined in their profiles. These may then subsist ordered/downloaded from the Publications Center

http://service5.boulder.ibm.com/pnsrege.nsf/messages/welcomeThe site is available in English and Canadian French.

Warranty: This program has warranty for one year from acquisition from IBM or authorized IBM traffic Partner. The warranty provided to the customer, for at least one year from acquisition, is access to databases (read Web sites) for program information and FAQs, including any known fixes to defects, which the customer can download or obtain otherwise and install at leisure.

Money-back guarantee: If for any reason you are dissatisfied with the program and you are the original licensee, revert it within 30 days from the invoice date, to the party (either IBM or its reseller) from whom you acquired it, for a refund. For clarification, note that for programs acquired under any of IBM's On/Off Capacity on require (On/Off CoD) software offerings,this term does not apply since these offerings apply to programs already acquired and in utilize by the customer.

Copy and utilize on home/portable computer: No

Volume orders (IVO): No

Passport Advantage® applies: No

Software Maintenance applies: Yes

All distributed software licenses embrace Software Maintenance (Software Subscription and Technical Support) for a age of 12 months from the date of acquisition, providing a streamlined way to acquire IBM software and assure technical support coverage for plenary licenses. Extending coverage for a total of three years from date of acquisition may subsist elected.

While your Software Maintenance is in effect, IBM provides you assistance for your routine, short duration installation and usage (how-to) questions; and code-related questions. IBM provides assistance via telephone and, if available, electronic access, only to your IS technical support personnel during the usual traffic hours (published prime shift hours) of your IBM support center. (This assistance is not available to your halt users.) IBM provides Severity 1 assistance 24 hours a day, every day of the year. For additional details, visit

http://techsupport.services.ibm.com/guides/handbook.htmlSoftware Maintenance does not embrace assistance for the design and progress of applications, your utilize of programs in other than their specified operating environment, or failures caused by products for which IBM is not accountable under this agreement.

Authorization: You may install and utilize only one copy of each component of the program, however components of the program may subsist installed on different machines.

The program allows you to discover and search sure network-connected systems and collect configuration and topology information. You are accountable for ensuring that You hold the necessary rights to access such systems and collect and utilize such information.

Additional authorization: The authorization for the program includes the perquisite to utilize the Virtualization Engine common components ("common components") provided with the program. The common components hold multiple elements. These components may only subsist used in direct support of the program, except for:

The Virtualization Engine Console component, which can subsist used to launch other programsThe IBM Integrated Solutions Console (ISC) component, which can subsist used as defined in the following sectionYour authorization for the program includes the restricted perquisite to utilize the included products packaged with the program, if any. The included products may embrace selected components of the following:

WebSphere® Application Server V6IBM Tivoli® Directory Server V6Your utilize of the included products is limited solely to support your licensed utilize of the program, and for no other purpose. The license terms provided with the included products govern your utilize of the included products except to the extent that such license terms provides greater usage rights, in which case the restrictions set forth in this paragraph supersede those terms and govern your use. If however, you license the included products separate from this program and receive a separate PoE, then your utilize of the included products is not limited by this paragraph.

Transfer of program rights and obligations: You may not transfer the program to another party. You may lag the program, subject to your PoE, to another machine within your enterprise. An enterprise is any legal entity (including, without limitation, an individual, a partnership, or a corporation) and its subsidiaries. A subsidiary is any legal entity, during the time that more than 50% of its voting stock, or if no voting stock, decision-making power, is owned or controlled, directly or indirectly, by the enterprise.

IBM has transformed its delivery of hardware and software support services to establish you on the road to higher systems availability. IBM Electronic Services is a Web-enabled solution that provides you with an exclusive, no-additional-charge enhancement to the service and support on the IBM eServer. You should benefit from greater system availability due to faster problem resolution and preemptive monitoring. Electronic Services is comprises two separate, but complementary, elements: IBM Electronic Services tidings page and IBM Electronic Service Agent(TM).

Electronic Services tidings page is a single Internet entry point that replaces the multiple entry points traditionally used to access IBM Internet services and support. The tidings page enables you to gain easier access to IBM resources for assistance in resolving technical problems.

The Electronic Service Agent is a no-additional-charge software that resides on your system. It is designed to proactively monitor events and transmit system inventory information to IBM on a periodic, customer-defined timetable. The Electronic Service Agent tracks system inventory, hardware mistake logs, and performance information. If the server is under a current IBM maintenance service agreement or within the IBM warranty period, the Service Agent automatically reports hardware problems to IBM. Early information about potential problems enables IBM to provide proactive service that maintains higher system availability and performance. In addition, information collected through the Service Agent will subsist made available to IBM service support representatives when they are helps acknowledge your questions or diagnosing problems. To occupy plenary edge of Electronic Services on an i5 running AIX 5L(TM) 5.2, clients should install Service Agent under AIX® 5L 5.2 to assist in reporting AIX operating system related problems.

To learn how IBM Electronic Services can work for you, visit

http://www.ibm.com/support/electronic

Back to top

Prices

The prices provided in this announcement are suggested retail prices for the U.S. and are provided for your information only. Dealer prices may vary, and prices may likewise vary by country. Prices are subject to change without notice. For additional information and current prices, contact your local IBM representative.

RDS 00013Yr SW Maint After $51,700LicenseIBM Global FinancingIBM Global Financing offers competitive financing to credit-qualified customers to assist them in acquiring IT solutions. Offerings embrace financing for IT acquisition, including hardware, software, and services, both from IBM and other manufacturers or vendors. Offerings (for plenary customer segments: small, medium, and great enterprise), rates, terms, and availability can vary by country. Contact your local IBM Global Financing organization or visit

http://www.ibm.com/financingIBM Global Financing offerings are provided through IBM Credit LLC in the United States and other IBM subsidiaries and divisions worldwide to qualified commercial and government customers. Rates are based on a customer's credit rating, financing terms, offering type, outfit type, and options, and may vary by country. Other restrictions may apply. Rates and offerings are subject to change, extension, or withdrawal without notice.

Reference: YE001The Americas call Centers, their national direct marketing organization, can add your cognomen to the mailing list for catalogs of IBM products.

Note: Shipments will start after the planned availability date.

Trademarks

iSeries, POWER, Virtualization Engine, Electronic Service Agent, and AIX 5L are trademarks of International traffic Machines Corporation in the United States or other countries or both.

The e-business logo, eServer, pSeries, xSeries, Passport Advantage, WebSphere, Tivoli, and AIX are registered trademarks of International traffic Machines Corporation in the United States or other countries or both.

Linux is a trademark of Linus Torvalds in the United States, other countries or both.

Other company, product, and service names may subsist trademarks or service marks of others.

Related
Thomas Industry Update

Stay up to date on industry tidings and trends, product announcements and the latest innovations.